Application data leakage preventing method and apparatus

An application, anti-leakage technology, applied in the application field, can solve the problems of limited security, easy to be broken, and can not meet the security requirements.

Active Publication Date: 2018-09-07
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing data leakage prevention system encrypts data through encryption software, which can only achieve limited security and is still easy to be broken. For users, especially mobile office users, it still cannot meet the growing security needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application data leakage preventing method and apparatus
  • Application data leakage preventing method and apparatus
  • Application data leakage preventing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions of the present invention will be further described in detail below through specific embodiments.

[0042] Embodiments of the present invention provide a method for preventing leakage of application data, such as figure 1 As shown, the method includes the following steps:

[0043] In step 100, a host program is installed on an intelligent terminal, the intelligent terminal has a security module embedded or externally inserted, and the identification code of the host program and the identification code of the security module are bound.

[0044] Preferably, the host program is an application management system implemented in the form of software, which is used to intercept and proxy system services on the intelligent terminal, install, call, monitor and manage target applications, and perform security checks on security The module function is called.

[0045] The security module is used for key generation, encryption and decryption, and identity ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application data leakage preventing method and apparatus. A host program and a use security module are installed in an intelligent terminal; system services are interceptedand agented through the host program; installation, calling, monitoring and management of a target application are realized; hardware encryption is realized through a security module; different keys are allocated for data files of the target application, and encryption and decryption of the keys are finished; and transparent encryption and decryption of data are realized by using particular keys for the data files needed to be encrypted. The target application accesses the data files only through the host program bound with the security module, so that the target application is enabled to runin a tight secret running space, and the data of the target application only can be used in the secret running space. According to the technical scheme, application data leakage is prevented more effectively, so that the application data has higher security.

Description

technical field [0001] The present invention relates to the technical field of application programs, in particular to a method and device for preventing leakage of application program data. Background technique [0002] The leakage of user data is an important aspect of information security. When users use smart terminals, applications and Trojan viruses may leak user data, causing privacy leakage and property losses to users. For state organs, enterprises and institutions, in order to protect the security of business data and confidential information, the data leakage prevention measures of smart terminals need to prevent information leakage caused by system loopholes and external attacks on the one hand, and prevent employees from improperly on the other hand. The leakage caused by the operation puts forward higher requirements for the intelligent terminal data leakage protection system. [0003] Using the sandbox technology, on the basis of the local operating system, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/71H04L9/14H04L9/08
CPCG06F21/602G06F21/6209G06F21/71G06F2221/2107H04L9/0819H04L9/0822H04L9/14
Inventor 刘熙胖廖正赟张嵩李铭乐武宗品李刚李平丁琦
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products